PyREBox - Python scriptable Reverse Engineering sandbox
PyREBox is a Python scriptable Reverse Engineering sandbox. It is based on QEMU, and its goal is to aid reverse engineering by providing dynamic analysis and debugging capabilities from a different...
View ArticleUdp2raw-tunnel - UDP Tunnel which tunnels UDP via FakeTCP/UDP/ICMP Traffic by...
A UDP Tunnel which tunnels UDP via FakeTCP/UDP/ICMP Traffic by using Raw Socket,helps you Bypass UDP FireWalls(or Unstable UDP Environment).Its Encrpyted,Anti-Replay and Multiplexed.It aslo acts as a...
View ArticleDeathStar - Automate getting Domain Admin using Empire
DeathStar is a Python script that uses Empire's RESTful API to automate gaining Domain Admin rights in Active Directory environments using a variety of techinques.How does it work?See the accompanying...
View ArticleYeti - Your everyday threat intelligence
Yeti is a platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unifiedrepository. Yeti will also automatically enrich observables (e.g. resolve...
View Articlefaker.js - Generate Massive Amounts of Fake Data
Generate massive amounts of fake data in Node.js and the browser.Demo https://cdn.rawgit.com/Marak/faker.js/master/examples/browser/index.htmlHosted API Microservice http://faker.hook.io Supports all...
View ArticleCansina - Web Content Discovery Tool
Cansina is a Web Content Discovery Application.It is well known Web applications don't publish all their resources or public links, so the only way to discover these resources is requesting for them...
View ArticleDracos Linux - Lightweight and Powerful Penetration Testing OS
Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools including information gathering, forensics, malware analysis, mantaining access, and...
View ArticleAvast DeepScreen Bypass [VisualBasic]
Public Shared Function Avast() As Boolean Dim functionReturnValue As Boolean = False If Process.GetProcessesByName("AvastSvc").Length >= 1 Then Return True End If Return False Return...
View ArticleSQLiv - Massive SQL injection scanner
Quick Tutorial1. Multiple domain scanning with SQLi dorkit simply search multiple websites from given dork and scan the results one by onepython sqliv.py -d <SQLIDORK>-e...
View ArticleOnline activist group Anonymous posts what it says are private contact...
A group affiliated with the online activist group known as Anonymous 17 August posted what it says are the private cellphone numbers and email addresses for 22 Republican members of Congress in a bid...
View ArticlePortia - Internal Network Penetration Tests
Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised.Privilege escalationLateral...
View ArticleKnock Subdomain Scan
Knockpy is a python tool designed to enumerate subdomains on a target domain through a wordlist. It is designed to scan for DNS zone transfer and to try to bypass the wildcard DNS record automatically...
View ArticleSegWit2x Could be in Trouble as Bitwala Becomes First Signatory to Renege on...
Blockchain banking and payment platform Bitwala has rescinded its support for the New York Agreement and says it will not “fork away” from the Bitcoin Core-backed blockchain if a blockchain split...
View ArticleAVPASS - Leaking and bypassing Android malware detection system
VPASS is a tool for leaking the detection model of Android malware detection systems (i.e., antivirus software), and bypassing their detection logics by using the leaked information coupled with APK...
View ArticleOnionScan - Investigating the Dark Web
OnionScan is a free and open source tool for investigating the Dark Web. For all the amazing technological innovations in the anonymity and privacy space, there is always a constant threat that has no...
View ArticleLANs.py - Inject Code, Jam Wifi, And Spy on Wifi Users
If you have any issues running this script I'd suggest checking out MITMf which does all the same things + more. Eventually this script needs to be rewritten with net-creds as the...
View ArticleziVA - iOS kernel exploit 64-bit iOS devices
An iOS kernel exploit designated to work on all 64-bit iOS devices <= 10.3.1Offsets modifications for other iOS devicesLike a lot (if not most) of the iOS kernel exploits, this also requires offsets...
View ArticleWINspect - Powershell-based Windows Security Auditing Toolbox
WINspect is part of a larger project for auditing different areas of Windows environments. It focuses on enumerating different parts of a Windows machine aiming to identify security weaknesses and...
View ArticleDELTA - SDN Security Evaluation Framework
DELTA is a penetration testing framework that regenerates known attack scenarios for diverse test cases. This framework also provides the capability of discovering unknown security problems in SDN by...
View ArticleSobelow - Security-Focused Static Analysis for the Phoenix Framework
Sobelow is a security-focused static analysis tool for the Phoenix framework. For security researchers, it is a useful tool for getting a quick view of points-of-interest. For project maintainers, it...
View Article